Description
In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser.
Published: 2019-03-28
Score: 6.1 Medium
EPSS: 2.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-0416 In Apache JSPWiki 2.9.0 to 2.11.0.M2, a carefully crafted URL could execute javascript on another user's session. No information could be saved on the server or jspwiki database, nor would an attacker be able to execute js on someone else's browser; only on its own browser.
Github GHSA Github GHSA GHSA-fmpq-w5q6-9vf9 Moderate severity vulnerability that affects org.apache.jspwiki:jspwiki-main
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T17:44:15.405Z

Reserved: 2018-11-14T00:00:00.000Z

Link: CVE-2019-0224

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-28T21:29:00.243

Modified: 2024-11-21T04:16:31.940

Link: CVE-2019-0224

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses